4.4

CVSS3.1

CVE-2026-35358 - uutils coreutils cp Semantic Loss and Potential Denial of Service with -R via Device Node Stream Re…

The cp utility in uutils coreutils, when performing recursive copies (-R), incorrectly treats character and block device nodes as stream sources rather than preserving them. Because the implementation reads bytes into regular files at the destination instead of using mknod, device semantics are des…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: May 4, 2026, 7:03 p.m.

4.7

CVSS3.1

CVE-2026-35357 - uutils coreutils cp Information Disclosure via Permission Handling Race

The cp utility in uutils coreutils is vulnerable to an information disclosure race condition. Destination files are initially created with umask-derived permissions (e.g., 0644) before being restricted to their final mode (e.g., 0600) later in the process. A local attacker can race to open the file…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:02 p.m.

6.3

CVSS3.1

CVE-2026-35356 - uutils coreutils install Arbitrary File Overwrite with -D via Path Component Symlink Race

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the install utility of uutils coreutils when using the -D flag. The command creates parent directories and subsequently performs a second path resolution to create the target file, neither of which is anchored to a directory file descr…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 12:27 p.m.

6.3

CVSS3.1

CVE-2026-35355 - uutils coreutils install Arbitrary File Overwrite via Symlink TOCTOU Race

The install utility in uutils coreutils is vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition during file installation. The implementation unlinks an existing destination file and then recreates it using a path-based operation without the O_EXCL flag. A local attacker can exploit …

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 12:27 p.m.

4.7

CVSS3.1

CVE-2026-35354 - uutils coreutils mv Security Xattr TOCTOU Race in Cross-Device

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability exists in the mv utility of uutils coreutils during cross-device moves. The extended attribute (xattr) preservation logic uses multiple path-based system calls that perform fresh path-to-inode lookups for each operation. A local attacker with wr…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:04 p.m.

3.3

CVSS3.1

CVE-2026-35353 - uutils coreutils mkdir Permission Exposure Race Condition with -m

The mkdir utility in uutils coreutils incorrectly applies permissions when using the -m flag by creating a directory with umask-derived permissions (typically 0755) before subsequently changing them to the requested mode via a separate chmod system call. In multi-user environments, this introduces …

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 12:27 p.m.

7

CVSS3.1

CVE-2026-35352 - uutils coreutils mkfifo Privilege Escalation via TOCTOU Race Condition

A Time-of-Check to Time-of-Use (TOCTOU) race condition exists in the mkfifo utility of uutils coreutils. The utility creates a FIFO and then performs a path-based chmod to set permissions. A local attacker with write access to the parent directory can swap the newly created FIFO for a symbolic link…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: May 4, 2026, 6:16 p.m.

4.2

CVSS3.1

CVE-2026-35351 - uutils coreutils mv Silent Ownership Loss in Cross-Device Operations

The mv utility in uutils coreutils fails to preserve file ownership during moves across different filesystem boundaries. The utility falls back to a copy-and-delete routine that creates the destination file using the caller's UID/GID rather than the source's metadata. This flaw breaks backups and m…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 27, 2026, 12:28 p.m.

6.6

CVSS3.1

CVE-2026-35350 - uutils coreutils cp Unexpected Privileged Executable Creation with -p

The cp utility in uutils coreutils fails to properly handle setuid and setgid bits when ownership preservation fails. When copying with the -p (preserve) flag, the utility applies the source mode bits even if the chown operation is unsuccessful. This can result in a user-owned copy retaining origin…

πŸ“… Published: April 22, 2026, 4:08 p.m. πŸ”„ Last Modified: April 24, 2026, 7:04 p.m.

6.7

CVSS3.1

CVE-2026-35349 - uutils coreutils Path-Based Safety Bypass with --preserve-root

A vulnerability in the rm utility of uutils coreutils allows a bypass of the --preserve-root protection. The implementation uses a path-string check rather than comparing device and inode numbers to identify the root directory. An attacker or accidental user can bypass this safeguard by using a sym…

πŸ“… Published: April 22, 2026, 4:07 p.m. πŸ”„ Last Modified: April 27, 2026, 12:28 p.m.
Total resulsts: 348038
Page 205 of 34,804
Β« previous page Β» next page
Filters